Sciweavers

1335 search results - page 62 / 267
» Privacy in Database Publishing
Sort
View
115
Voted
EDBT
2008
ACM
144views Database» more  EDBT 2008»
16 years 3 months ago
Protecting privacy in recorded conversations
Professionals in the field of speech technology are often constrained by a lack of speech corpora that are important to their research and development activities. These corpora ex...
Scot Cunningham, Traian Marius Truta
EDBT
2008
ACM
154views Database» more  EDBT 2008»
16 years 3 months ago
Data utility and privacy protection trade-off in k-anonymisation
K-anonymisation is an approach to protecting privacy contained within a dataset. A good k-anonymisation algorithm should anonymise a dataset in such a way that private information...
Grigorios Loukides, Jianhua Shao
CRYPTO
2008
Springer
75views Cryptology» more  CRYPTO 2008»
15 years 5 months ago
New Efficient Attacks on Statistical Disclosure Control Mechanisms
The goal of a statistical database is to provide statistics about a population while simultaneously protecting the privacy of the individual records in the database. The tension be...
Cynthia Dwork, Sergey Yekhanin
ICDE
2009
IEEE
154views Database» more  ICDE 2009»
16 years 5 months ago
A General Proximity Privacy Principle
Recent years have witnessed ever-increasing concerns about individual privacy in numerous data dissemination applications that involve private personal information, e.g., medical...
Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, C...
114
Voted
DEXAW
2003
IEEE
131views Database» more  DEXAW 2003»
15 years 9 months ago
Privacy and Trusted Computing
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
Juan Manuel González Nieto, Ed Dawson, Eiji...